Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
References
Link | Resource |
---|---|
http://lists.vmware.com/pipermail/security-announce/2009/000069.html | Patch Vendor Advisory |
http://secunia.com/advisories/37186 | Broken Link |
http://security.gentoo.org/glsa/glsa-201209-25.xml | Third Party Advisory |
http://securitytracker.com/id?1023088 | Third Party Advisory VDB Entry |
http://securitytracker.com/id?1023089 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/507523/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/36842 | Third Party Advisory VDB Entry |
http://www.vmware.com/security/advisories/VMSA-2009-0015.html | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2009/3062 | Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7822 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2009-11-02 15:30
Updated : 2024-05-17 17:27
NVD link : CVE-2009-3733
Mitre link : CVE-2009-3733
CVE.ORG link : CVE-2009-3733
JSON object : View
Products Affected
vmware
- esx
- server
- esxi
linux
- linux_kernel
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')